Education Technology


Cybersecurity 6- Brute Force

Activity Overview

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.

About the Lesson

For more information on this series of activities and set-up required, check out the Computer Science Resources page.